The term Internet of Things (IoT) has picked up in popularity as more and more devices are connected to the Internet. Everything from home refrigerators to industrial control systems have been found connected, and in many cases, with minimal to no security. What are the consequences? How should they be secured? Should IoT devices be avoided? Read below to find out.
As Cryptocurrency such as bitcoin becomes more mainstream, attacks focusing on generating and/or stealing more of these coins are becoming more common. Since 2015, there have been several large-scale attacks on coin exchanges, and we’re now even seeing websites that are embedding code to hijack resources from visitors. So what does that mean for Internet users, and how to they prevent hijacking?
What is BIOS security? Why enable it? What else can be done to protect publicly accessible machines and take home company laptops?
In my previous write-up about WannaCry, I addressed that the tools were dumped by a group called ShadowBrokers. But who are they? What is their motivation? Let’s take a look.
Before we can address the lessons learned from the WannaCry attack, we first need to understand what it was and how it spread so efficiently.